If you are visiting this website because you are receiving
unwanted or unrequested traffic, then please use our search form to identify the researchers responsible for generating your traffic. If you are unable to identify a researcher, or require assistance in pursuing your complaint, then please contact PlanetLab support at the address "support
@
planet-lab.
org".
(support@planet-lab.org). We will ensure that your concerns are
addressed in a timely manner.

If you have received UDP traceroute packets from a number of
PlanetLab nodes, you or another user on your network may have recently
accessed a website cached by the Coral project, which runs on
PlanetLab. Many websites, including Slashdot, regularly post
"Coralized" links to popular content. Coral actively probes its
clients using a fast traceroute-like tool, to determine the nearest
proxy for its clients to use. If you do not want to receive such
probes, discontinue accessing URLs that end in
.nyud.net:8090.

If you are receiving HTTP requests from PlanetLab nodes,
users may be accessing your website through Coral or CoDeeN, another content
distribution network that runs on PlanetLab. If you do not want your
site to be cached by Coral or CoDeeN, please contact the maintainers of Coral or
the maintainers of
CoDeeN directly.

If your intrusion detection system (IDS) claims that a PlanetLab
node may be compromised with a virus because of traffic that it sent
you, the IDS is likely to be mistaken. All PlanetLab nodes run a
custom version of Linux, not Windows. Each node boots from secure,
immutable media and is installed with only the minimum amount of
software. All services, such as Coral and CoDeeN, run in virtual
servers that, even if compromised, remain isolated from the rest
of the system. PlanetLab Operations staff work full-time to monitor
and ensure the security and integrity of the network.

If you are unable to determine the source of the traffic, please
contact PlanetLab Support (support@planet-lab.org). Feel
free to direct any additional concerns or questions about PlanetLab to
this address.

Start time and end time are specified in the format yyyy/mm/dd[:HH] (eg. 2008/4/20)

Current port assignments

Slice

Port range

pusan_p2p

1 - 1024

pusan_p2p

22 - 23

watta_phil

1025 - 1026

upatras_dp2psim

1099 - 1100

arizona_dht

1200 - 1300

usf_mobius_dm

2005 - 2015

ege_testslice

2500 - 5000

dd_pro

3000 - 3001

ger_test

3100 - 3200

umd_scriptroute

3355 - 3356

uw_trs2

5850 - 5855

wide_utokyo

6060

gt_florence

6061 - 6062

uniklu_x2x

6132

dark_test

6233

marq_game

6234 - 6235

xxx_xxx_xxx_xxx

6666 - 6667

bupt_fl

6990 - 7000

certhple_purs1

7777 - 7778

docomo_datacollection

8000 - 8020

any_other

8021 - 8069

nyu_d

8070 - 8099

ucsc_cryptocurrency

8100 - 8110

intelfolsom_webmeasure

8200

intelfolsom_scan

8201

naim_tech

8300 - 8350

gmu_schulte

8500

gmu_schulte

8510

gmu_jclarks

8520 - 8530

hplabs_oasis

8600 - 8650

cmu_agens

8710 - 8720

wroc_soa

8887 - 8897

usf_mobius_dm

9001 - 9300

snummlab_c0

9695 - 9700

utoronto_lie_octant2

9876 - 9877

ktheeple_coopcache

9990 - 9999

howard_IRP

10000 - 10010

wide_utokyo

10113 - 10115

wide_utokyo

10116 - 10117

wroc_starczewski

11110

wroc_starczewski

11111

wroc_rodkiewicz

11112

neo_test

12000 - 13000

uniklu_x2x

13130

hauke_raedt

14000 - 14999

wide_utokyo

15000 - 20000

sta_rfbh

20001 - 20999

northwestern_load

21080 - 21089

ioannina_experiments

25500 - 25530

ist_pson

28349 - 28350

ist_pson

28450 - 28500

blah_blah

30000 - 30200

loriaple_anon

30300 - 30400

ist_pson

30500 - 30600

unimelb_barker

31400 - 31430

keith_wsop

32000 - 42000

unr_Telescope

32121 - 32122

wroc_nowicki

33333

Mine_mine

34000 - 34010

keio_mptcp

34343 - 34346

waseda_measurement

35000 - 35100

iub_ssl_reputation

38170 - 38190

ksu_p2p

40000 - 40010

ufl_wow

44300 - 44399

ufl_testwow

44400 - 44500

hplabs_oasis

46000 - 46050

michigan_2

50001 - 50110

warsaw_md

50150 - 50160

hcu_shima

50200 - 50209

snummlab_c0

50301 - 50400

hiit_dht

50500

oth_test

50505

aeon_test

50506 - 50510

montana_cam

51000 - 51040

montana_cam

51041 - 51220

hiit_dht

54500

uwaterloo_geossl

54501 - 54510

delft_peerflix

54511 - 54530

msu_3

54700 - 54750

ege_testslice

55000 - 55100

michigan_2

61001 - 61400

ln_slice_gush

61401 - 61414

ktheeple_monitoring

61600 - 61750

kjist_shan

62000 - 62500

uiuc_avmon

62005 - 62015

upenn_mcanonymous

62600 - 62610

quantavisple_proxy

63400 - 63500

benjarobbi_test

63501 - 63504

pitt_measurement

64001 - 64500

tw_hub1

64501 - 64566

pitt_measurement

64567

div_bn_bct

64568

keio_mptcp

64569

mit_psirp

64600 - 64625

kjist_shan

65000 - 66000

docomo_teststream1

68001 - 68999

pitt_measurement

69000 - 69500

paul_josec

69600 - 69800

samknows_test_slice

69801 - 69900

neo_test

69901 - 69999

clay_anon

70000 - 70010

neo_geo

70011 - 70099

neo_gea

70100 - 79999

video_uk

80000 - 89999

fan_fan

90000 - 99999

qmulple_clientmonSDN

100000 - 100100

fan_fan

100101 - 100105

Slice name

Desired port range

Instructions:

Specify the port range in the form 62000-62010

Total traffic:

Yesterday, 1,859,931,889 packets were transmitted. This is 5.99 % of the maximum transmission I have seen. In terms of bytes, a total of 1,368,592,332,709 were transmitted, which is 6.10 % of the maxium transmission that I have seen.

A total of 1073 slices participated in this transmission.

Out of network traffic:

Yesterday, 2,715,478,324 packets were transmitted. This is 12.27 % of the maximum transmission I have seen. In terms of bytes, a total of 1,597,730,853,158 were transmitted, which is 13.34 % of the maxium transmission that I have seen.